Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.dll
-
Size
635KB
-
MD5
d712c2872a7130cfd2280d0d8dca3bc1
-
SHA1
8d6a479b16a75366f70277e44aed2c72a32ba59e
-
SHA256
60c16a70e63a430b15dd7ec70dc9e72d8a42d707d2fef69ddeee3a48d9c4f7f2
-
SHA512
cbe00dd485bf3e9d5b52f6b0c016f65d271f461a867d879c4124e8a3695d4455c8ae600cf5168b3d5c5e24e8a81bd30d9fa9881bada37e61e0ab5e9ff80e1fcb
-
SSDEEP
12288:gM0t9FNcxDMmfrLAF8rZIRf2MmsXaDZ3whq/fO79s:AtjNcXnVInvadAhq
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{CC01FC6C-2A73-58B6-41AE-D3241E86B645} regsvr32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.axc regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.axc\ = "axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.axc\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.axc\Clsid\ = "{CC01FC6C-2A73-58B6-41AE-D3241E86B645}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\ = "axc" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645}\ProgID\ = "d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.axc" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CC01FC6C-2A73-58B6-41AE-D3241E86B645} regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29 PID 1348 wrote to memory of 2672 1348 regsvr32.exe 29
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\d712c2872a7130cfd2280d0d8dca3bc1_JaffaCakes118.dll2⤵
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2672
-